General
-
Target
d72dcfa96e4df27c90f0acb2024a2774_JaffaCakes118
-
Size
22.7MB
-
Sample
240909-16mhlashqj
-
MD5
d72dcfa96e4df27c90f0acb2024a2774
-
SHA1
1176fda124f12dc046544335816db9084ab372a3
-
SHA256
f3a6ffd7fe25a4ffc2de90d1b8c8653bf2fbc0cc1d5dfa5a2674ce0b8bece642
-
SHA512
bce6746237c80b1339143b7ab570e474f44dde1204391f0217c073ee61d866a045ab21d4fafba86d6ce39bc9ce8894b046a7d77bc4906af82aaf7e7d6a94cab6
-
SSDEEP
393216:bWlSgFXaHPdWW8T3S1LAFo+IV24+LUQIceKocWtpJaF8hyKyCqHTxYQ:fgpiVW96HV2kvVcspkFiyKOTp
Static task
static1
Behavioral task
behavioral1
Sample
d72dcfa96e4df27c90f0acb2024a2774_JaffaCakes118.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
d72dcfa96e4df27c90f0acb2024a2774_JaffaCakes118
-
Size
22.7MB
-
MD5
d72dcfa96e4df27c90f0acb2024a2774
-
SHA1
1176fda124f12dc046544335816db9084ab372a3
-
SHA256
f3a6ffd7fe25a4ffc2de90d1b8c8653bf2fbc0cc1d5dfa5a2674ce0b8bece642
-
SHA512
bce6746237c80b1339143b7ab570e474f44dde1204391f0217c073ee61d866a045ab21d4fafba86d6ce39bc9ce8894b046a7d77bc4906af82aaf7e7d6a94cab6
-
SSDEEP
393216:bWlSgFXaHPdWW8T3S1LAFo+IV24+LUQIceKocWtpJaF8hyKyCqHTxYQ:fgpiVW96HV2kvVcspkFiyKOTp
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-